Reverse Technology Cellular Phone Different Program to Desktop Computer: Tinder

Reverse Technology Cellular Phone Different Program to Desktop Computer: Tinder

Quick Details

1 Reverse Engineering Cellular phone elite Application to desktop computer: Tinder Honours work for Carleton University Samuel Pra.

Outline

Reverse technology Cellphone elite program to desktop computer: Tinder Honours work for Carleton University Samuel Prashker – 100755635 Supervised by: Dr. Dwight Deugo class of Computer technology Carleton University Ottawa, Canada

Abstract numerous solutions found on smartphones focus on that program because of the comfort, ease of use, and portability. But several of these applications do not have any functionality that relies on the cellular program by itself. Tinder, including, a mobile relationship app, was developed and set when it comes down to single purpose of operating on Android and iphone 3gs, restricting the means to access those main ecosystems. From a security viewpoint so when a proof of principle in giving support to the discussion against cellular exclusive applications, the Android os form of Tinder has become reverse engineered to function on a normal desktop computer through a Universal Microsoft windows program program, dubbed: Tindows.

Acknowledgments I wish to give thanks to my pals who generously contributed her mobile phones throughout the start actions for the project. Without them I would personally n’t have had the opportunity to start the very long and difficult means of network sniffing and reverse technology. I wish to thank Curtis Schouten for promoting their windowpanes 10 pill for assessment associated with the worldwide software codebase on a proper mobile device. I’d additionally always specifically thank by name Patrick Cuerrier and Issa-Albert Kane are actual people that have been willing to contribute their particular account during construction on the application. Without her realworld facts, many bugs wouldn’t normally were identified.

Dining table of Contents 1. Introduction . 5

Back Ground . 9 2.1.

Representational condition move . 11

Protected Sockets Layer (SSL) . 11

Starting Android os to Proxy site visitors through a Remote Computer . 13

Circumventing Encrypted SSL site visitors with a Man-In-The-Middle assault . 14

Documenting the Login Process for Tinder . 16

Documenting the API Calls of Standards Tinder Task. 18

Tinder’s Update Circle . 21

Preliminary action of Porting – promoting a Tinder Client Library in C#. 23

Universal Windows system and Acquiring the fb OAuth Token . 25

XAML and Information Binding . 28

Tindows – The “SuperficialPage” . 29

Tindows – The “ConversationPage” . 31

Tindows – Notification . 33

Outcomes and recognition. 35 4.1.

Validating the TinderAPI . 35

Validating the User Interface and Application feel . 36

Summation. 39 5.1.

Potential Efforts . 40

6. Recommendations . 42 7. Appendix . 43

1. Introduction 1.1.

Together with the growth in smartphone usage and interest in mobile software ecosystems restricted to mobile platforms (Bing Enjoy Store, Apple App Store, Microsoft Store), applications having practical or convenient uses on conventional systems for example Desktops remain inside the dirt to get forgotten. Software are increasingly being exclusively produced for special cellular practices. There isn’t any desktop webpage are supplied, but quite simply an internet site to market the smartphone program. This tactic of uniqueness can restrict consumers’ solutions whenever deciding which solutions to get, which appliances to get and which ecosystems to link by themselves to. Physical fitness tracking and calorie-counting solutions become an example of a challenge this is certainly resolved platformindependent. As an example, MyFitnessPal provides all potential avenues to use their particular system: Android os, new iphone, Windows mobile, and a completely highlighted web site promoting close efficiency to the mobile solutions. The majority of applications that begun prior to the introduction of smartphones posses correctly ported their own solutions to mobile networks (ex: PayPal, e-bay, Amazon, Gmail, etc.). The situation is based on applications and businesses that spawn strictly with a focus on mobile markets. One particular issue is Tinder: a dating program for Android os and new iphone only. Despite online-dating being a traditionally program agnostic issue, Tinder unfortunately confines its consumers to two platforms. Imagine if the user changes to a Windows cell? What if a person do not have a cell phone and wish to get access to it to their Mac computer or Microsoft windows equipment? There’s absolutely no usability available from Tinder that as a requirement needs a mobile platform. Therefore, I will be attempting to resolve this by deciding the client-server architecture of Tinder and porting it to a Desktop customer that communicates with Tinder’s servers.

The desire behind developing a desktop computer program are divided into a couple of creating power. Largely, while the culmination of my 4 many years within some type of computer and websites Security centered stream, a project that demonstrates those honed skill try a worthy cause to follow. In determining how Tinder communicates to their servers, from a security standpoint, there may potentially end up being numerous obstacles to overcome, safety measures to combat and info to spoof. Likely the client produced will need to “act” like a mobile unit. The class associated with the protection set up should determine the particular problem in completing this. Second, as a person who doesn’t think about the desktop computer system are a dying marketplace, i’m directly driven to make certain its endurance. While this venture is only an educational proof-of-concept that it can be done, the message to eliminate is that you can easily do, and this should be done. Software produced for any mobile system requires equally accessible desktop computer counter parts (provided the application form doesn’t rely on non-traditional pc machines such as for example camcorder, GPS, flash light). Third, this is a project that may need dealing with engineering that have been glanced over within my researches. In deciding the traffic being delivered across the cable, you can find multiple methods such as for example Wireshark that will have to be read and put on this project. Moreover, if there is function the software executes regarding device, it’s possible a de-compilation for the application is needed (when it comes gay dating online to Android os it would indicate de-assembling the program to “smali” format, something We have never ever done but are driven to educate yourself on).

The first goal is always to figure out all types of telecommunications Tinder do to perform the application efficiency, such as (but not restricted to) how does Tinder speak and authenticate to myspace, just how can they communicate and authenticate their very own hosts, as well as how carry out they obfuscate or encrypt or else secure their unique telecommunications channels. What performed around the 6

Dejar un comentario

Tu dirección de correo electrónico no será publicada. Los campos obligatorios están marcados con *